Artículos de revistas sobre el tema "Metric Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Metric Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Neto, Afonso Araújo y Marco Vieira. "Benchmarking Untrustworthiness". International Journal of Dependable and Trustworthy Information Systems 1, n.º 2 (abril de 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Texto completoShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan y Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability". Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Texto completoDíaz, Álvaro, Javier González-Bayon y Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator". Journal of Circuits, Systems and Computers 25, n.º 07 (22 de abril de 2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Texto completoYee, George O. M. "Designing Sound Security Metrics". International Journal of Systems and Software Security and Protection 10, n.º 1 (enero de 2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Texto completoShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu y Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security". Security and Communication Networks 2021 (24 de agosto de 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Texto completoTjirare, D. y F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia". Namibian Journal for Research, Science and Technology 1, n.º 1 (16 de octubre de 2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Texto completoJouini, Mouna y Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems". International Journal of Organizational and Collective Intelligence 4, n.º 3 (julio de 2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Texto completoLe, Ngoc Thuy y Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security". Journal of Telecommunications and the Digital Economy 7, n.º 1 (30 de marzo de 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Texto completoKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi y Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products". Indian Journal of Science and Technology 8, S8 (1 de abril de 2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Texto completoIto, Kosuke, Shuji Morisaki y Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines". IoT 2, n.º 4 (15 de diciembre de 2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Texto completoAli, Shahbaz, Muhammad Khalid Mahmood, Fairouz Tchier y F. M. O. Tawfiq. "Classification of Upper Bound Sequences of Local Fractional Metric Dimension of Rotationally Symmetric Hexagonal Planar Networks". Journal of Mathematics 2021 (27 de febrero de 2021): 1–24. http://dx.doi.org/10.1155/2021/6613033.
Texto completoDelli Priscoli, Francesco, Vincenzo Suraci, Roberto Germanà, Alessandro Giuseppi, Andrea Tortorelli y Andrea Fiaschetti. "A security metric for assessing the security level of critical infrastructures". International Journal of Critical Computer-Based Systems 10, n.º 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.10030622.
Texto completoTortorelli, Andrea, Andrea Fiaschetti, Alessandro Giuseppi, Vincenzo Suraci, Roberto Germanà y Francesco Delli Priscoli. "A security metric for assessing the security level of critical infrastructures". International Journal of Critical Computer-Based Systems 10, n.º 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.108685.
Texto completoKhan, Naveed, Jianbiao Zhang y Saeed Ullah Jan. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server". Security and Communication Networks 2022 (14 de marzo de 2022): 1–14. http://dx.doi.org/10.1155/2022/1943426.
Texto completoShi, Fan, Shaofeng Kai, Jinghua Zheng y Yao Zhong. "XLNet-Based Prediction Model for CVSS Metric Values". Applied Sciences 12, n.º 18 (7 de septiembre de 2022): 8983. http://dx.doi.org/10.3390/app12188983.
Texto completoAdamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek y Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments". Foundations of Computing and Decision Sciences 42, n.º 4 (20 de diciembre de 2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.
Texto completoWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang y Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems". Wireless Communications and Mobile Computing 2022 (29 de mayo de 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Texto completoFarid, Farnaz, Seyed Shahrestani y Chun Ruan. "A Metric-Based Approach for Quality Evaluation in Distributed Networking Systems". International Journal of Interactive Communication Systems and Technologies 9, n.º 1 (enero de 2019): 48–76. http://dx.doi.org/10.4018/ijicst.2019010104.
Texto completoHu, Hao, Yuling Liu, Hongqi Zhang y Yuchen Zhang. "Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis". Security and Communication Networks 2018 (2 de agosto de 2018): 1–14. http://dx.doi.org/10.1155/2018/5787102.
Texto completoNovikova, Evgenia, Elena Doynikova, Diana Gaifulina y Igor Kotenko. "Construction and Analysis of Integral User-Oriented Trustworthiness Metrics". Electronics 11, n.º 2 (12 de enero de 2022): 234. http://dx.doi.org/10.3390/electronics11020234.
Texto completoDin, Roshidi, Rosmadi Bakar, Azizan Ismail, Aida Mustapha y Sunariya Utama. "Evaluation review of effectiveness and security metrics performance on information technology domain". Indonesian Journal of Electrical Engineering and Computer Science 16, n.º 2 (1 de noviembre de 2019): 1059. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1059-1064.
Texto completoChubaievskyi, Vitaliy, Valery Lakhno, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, Andrii Blozva y Boris Gusev. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS". Cybersecurity: Education, Science, Technique 1, n.º 13 (2021): 16–28. http://dx.doi.org/10.28925/2663-4023.2021.13.1628.
Texto completoZhang, Jing, Han-ying Hu, Min Tong y Qing-rong Li. "A Security Metric and Related Security Routing Algorithm Design Based on Trust Model". Journal of Electronics & Information Technology 30, n.º 1 (17 de febrero de 2011): 10–15. http://dx.doi.org/10.3724/sp.j.1146.2007.00726.
Texto completoJekl, Jan y Jiří Jánský. "Security Challenges and Economic-Geographical Metrics for Analyzing Safety to Achieve Sustainable Protection". Sustainability 14, n.º 22 (16 de noviembre de 2022): 15161. http://dx.doi.org/10.3390/su142215161.
Texto completoSharma Gaur, Madhu y Bhaskar Pant. "Trust Metric based Soft Security in Mobile Pervasive Environment". International Journal of Computer Network and Information Security 6, n.º 10 (8 de septiembre de 2014): 64–71. http://dx.doi.org/10.5815/ijcnis.2014.10.08.
Texto completoAgrawal, A. "Software Security Metric Development Framework (An Early Stage Approach)". American Journal of Software Engineering and Applications 2, n.º 6 (2013): 150. http://dx.doi.org/10.11648/j.ajsea.20130206.14.
Texto completoMukherjee, Preetam y Chandan Mazumdar. "“Security Concern” as a Metric for Enterprise Business Processes". IEEE Systems Journal 13, n.º 4 (diciembre de 2019): 4015–26. http://dx.doi.org/10.1109/jsyst.2019.2918116.
Texto completoZonouz, Saman A., Robin Berthier, Himanshu Khurana, William H. Sanders y Tim Yardley. "Seclius: An Information Flow-Based, Consequence-Centric Security Metric". IEEE Transactions on Parallel and Distributed Systems 26, n.º 2 (febrero de 2015): 562–73. http://dx.doi.org/10.1109/tpds.2013.162.
Texto completoAlmasizadeh, Jaafar y Mohammad Abdollahi Azgomi. "Mean privacy: A metric for security of computer systems". Computer Communications 52 (octubre de 2014): 47–59. http://dx.doi.org/10.1016/j.comcom.2014.06.009.
Texto completoPurohit, Neha, Shubhalaxmi Joshi, Milind Pande y Susan Lincke. "Pragmatic analysis of ECC based security models from an empirical perspective". Journal of Discrete Mathematical Sciences & Cryptography 26, n.º 3 (2023): 739–58. http://dx.doi.org/10.47974/jdmsc-1749.
Texto completoRakovskiy, Dmitriy I. "Influence of multi&label class problem of system logs on the security of computer networks". H&ES Research 15, n.º 1 (2023): 48–56. http://dx.doi.org/10.36724/2409-5419-2023-15-1-48-56.
Texto completoCasola, Valentina, Antonino Mazzeo, Nicola Mazzocca y Valeria Vittorini. "A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures". Journal of Computer Security 15, n.º 2 (5 de febrero de 2007): 197–229. http://dx.doi.org/10.3233/jcs-2007-15201.
Texto completoDobrowolski, Zbysław y Grzegorz Drozdowski. "Does the Net Present Value as a Financial Metric Fit Investment in Green Energy Security?" Energies 15, n.º 1 (4 de enero de 2022): 353. http://dx.doi.org/10.3390/en15010353.
Texto completoChen, Hongsong, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee y Zhongchuan Fu. "A novel SMP-based survivability evaluation metric and approach in wireless sensor network". Computer Science and Information Systems 16, n.º 3 (2019): 733–51. http://dx.doi.org/10.2298/csis180918024c.
Texto completoYevseiev, Serhii, Oleksandr Milov, Ivan Opirskyy, Olha Dunaievska, Oleksandr Huk, Volodymyr Pogorelov, Kyrylo Bondarenko, Nataliia Zviertseva, Yevgen Melenti y Bogdan Tomashevsky. "Development of a concept for cybersecurity metrics classification". Eastern-European Journal of Enterprise Technologies 4, n.º 4 (118) (31 de agosto de 2022): 6–18. http://dx.doi.org/10.15587/1729-4061.2022.263416.
Texto completoShen, Danyao, Fengchao Zhu, Zhanpeng Zhang y Xiaodong Mu. "Radio Frequency Fingerprint Identification Based on Metric Learning". International Journal of Information Technologies and Systems Approach 16, n.º 3 (13 de abril de 2023): 1–13. http://dx.doi.org/10.4018/ijitsa.321194.
Texto completoPark, Ui Hyun, Jeong-hyeop Hong, Auk Kim y Kyung Ho Son. "Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust". Electronics 12, n.º 8 (18 de abril de 2023): 1906. http://dx.doi.org/10.3390/electronics12081906.
Texto completoRehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan y Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network". Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.
Texto completoLau, Terry Shue Chien y Chik How Tan. "On the design and security of Lee metric McEliece cryptosystems". Designs, Codes and Cryptography 90, n.º 3 (18 de enero de 2022): 695–717. http://dx.doi.org/10.1007/s10623-021-01002-2.
Texto completoRajaSekhar, K., L. S. S. Reddy y U. J. Kameswari. "Secure System of Attack Patterns towards Application Security Metric Derivation". International Journal of Computer Applications 53, n.º 1 (25 de septiembre de 2012): 11–18. http://dx.doi.org/10.5120/8384-1987.
Texto completoSchwartau, Winn. "Network Security It’s About Time: An Offer for a Metric". Network Security 2001, n.º 8 (agosto de 2001): 11–13. http://dx.doi.org/10.1016/s1353-4858(01)00815-7.
Texto completoSimpson, Joseph J., Ann Miller y Cihan H. Dagli. "6.3.1 Secure Adaptive Response Potential (SARP): A System Security Metric". INCOSE International Symposium 18, n.º 1 (junio de 2008): 706–19. http://dx.doi.org/10.1002/j.2334-5837.2008.tb00838.x.
Texto completoGhobrial, Atef y Theodore H. Poister. "Evaluating security of rail transit systems: A metric system approach". Journal of Advanced Transportation 29, n.º 2 (marzo de 1995): 251–62. http://dx.doi.org/10.1002/atr.5670290208.
Texto completoKhan, Salman A., Kashif Iqbal, Nazeeruddin Mohammad, Rehan Akbar, Syed Saad Azhar Ali y Ammar Ahmed Siddiqui. "A Novel Fuzzy-Logic-Based Multi-Criteria Metric for Performance Evaluation of Spam Email Detection Algorithms". Applied Sciences 12, n.º 14 (12 de julio de 2022): 7043. http://dx.doi.org/10.3390/app12147043.
Texto completoYeremenko, Oleksandra, Mykhailo Persikov, Valentyn Lemeshko y Bassam Altaki. "Research and Development of the Secure Routing Flow-Based Model with Load Balancing". Problemi telekomunìkacìj, n.º 2(29) (22 de diciembre de 2021): 3–14. http://dx.doi.org/10.30837/pt.2021.2.01.
Texto completoTkaczyk, Zoé y William G. Moseley. "Dietary Power and Self-Determination among Female Farmers in Burkina Faso: A Proposal for a Food Consumption Agency Metric". Land 12, n.º 5 (28 de abril de 2023): 978. http://dx.doi.org/10.3390/land12050978.
Texto completoYin, Lihua, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li y Binxing Fang. "Security Measurement for Unknown Threats Based on Attack Preferences". Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/7412627.
Texto completoSegura Smith, Andrea, Julie Porter, Amogh Badwe, Eileen F. Kiamanesh y Douglas W. Blayney. "Quality, clinician and information technology (IT) partnership for metric reporting." Journal of Clinical Oncology 35, n.º 8_suppl (10 de marzo de 2017): 128. http://dx.doi.org/10.1200/jco.2017.35.8_suppl.128.
Texto completoTashtoush, Yahya M., Aisha Zaidan y Izzat M. Alsmadi. "Implications for Website Trust and Credibility Assessment". International Journal of E-Entrepreneurship and Innovation 3, n.º 4 (octubre de 2012): 17–33. http://dx.doi.org/10.4018/jeei.2012100102.
Texto completoRamanauskaitė, Simona, Neringa Urbonaitė, Šarūnas Grigaliūnas, Saulius Preidys, Vaidotas Trinkūnas y Algimantas Venčkauskas. "Educational Organization’s Security Level Estimation Model". Applied Sciences 11, n.º 17 (31 de agosto de 2021): 8061. http://dx.doi.org/10.3390/app11178061.
Texto completo